Abstract
The process of acquiring computing resources includes several activities related to planning, budgeting, comparing alternative options, configuration and change management, etc. Our focus in this book is on securing information and computing resources. As such, selected KSAs as well as the content of each KSA will be focused on this subject only.
Bibliography
- (CSD), NIST Computer Security Division (2010) NISTIR 7622 draft, piloting supply chain risk management practices for federal information systems (DRAFT), pp 1–78Google Scholar
- Acq.osd.mil (2011) Program protection plan outline & guidance, Ver. 1.0. Deputy Assistant Secretary of Defense, Systems Engineering. https://www.acq.osd.mil/se/initiatives/init_pp-sse.html
- Alsmadi I, Burdwell R, Aleroud A, Wahbeh A, Ali Al-Qudah M, Al-Omari A (2018) Security and access controls: lesson plans. In: Practical information security. Springer, ChamCrossRefGoogle Scholar
- Alves P, Campos P, Oliveira E (2012a) Modeling the trustworthiness of a supplier agent in a B2B relationship. In: Camarinha-Matos LM, Xu L, Afsarmanesh H (eds) Collaborative networks in the internet of services. PRO-VE 2012. IFIP advances in information and communication technology, vol 380. Springer, BerlinGoogle Scholar
- Alves P, Campos P, Oliveira E (2012b) Modeling the trustworthiness of a supplier agent in a B2B relationship, PRO-VE 2012. International Federation for Information Processing IFIP AICT 380, pp 675–686Google Scholar
- Blos MF, Quaddus M, Wee HM, Watanabe K (2009) Supply chain risk management (SCRM): a case study on the automotive and electronic industries in Brazil. Supply Chain Manag 14(4):247–252CrossRefGoogle Scholar
- Boyens JM, Paulsen C, Moorthy R, Bartol N (2015) Supply chain risk management practices for federal information systems and organizations. https://doi.org/10.6028/nist.sp.800-161
- Defense Acquisition University Press (2001) System engineering fundamentals. http://acqnotes.com
- Department of Homeland Security Cyber Security Division (2007) Software assurance in acquisition: mitigating risks to the enterprise, Draft Version 1.0Google Scholar
- DHS (2008) Acquisition instruction/guidebook, 102-01-001, INTERIM, Version 1.9Google Scholar
- DOE (2018) DOE G 430.1-1 Chp 23, life cycle cost estimate. https://www.directives.doe.gov/directives-documents/400-series/0430.1-EGuide-1-Chp23
- Grady JO (2006) System requirements analysis. Academic, CambridgeCrossRefGoogle Scholar
- Hutton JP (2010) United States Government Accountability Office, Deepwater requirements, quantities, and cost require revalidation to reflect knowledge gained, GAO-10-790, https://www.gao.gov/assets/310/307742.htmlGoogle Scholar
- Ivancic WD, Vaden KR, Jones RE, Roberts AM (2015) Operational concepts for a generic space exploration communication network architecture, Technical report, NASA Glenn Research CenterGoogle Scholar
- National Institute of Standards and Technology (NIST) 800-161 (2015), Supply chain risk management practices for federal information systems and organizations. U.S. Department of Commerce, p 9Google Scholar
- Polydys ML, Wisseman S (2009a) Software assurance in acquisition: mitigating risks to the enterprise. Technical paper. http://www.dtic.mil/dtic/tr/fulltext/u2/a495389.pdf
- Polydys ML, Wisseman S (2009b) Software assurance in acquisition: mitigating risks to the enterprise. Occasional paper, Information Resources Management College. http://www.dtic.mil/dtic/tr/fulltext/u2/a495389.pdf
- Porter M (2008) Competitive advantage: creating and sustaining superior performance. Simon and Schuster, New YorkGoogle Scholar
- Sengupta A (2011) Method for processing documents containing restricted information: Google patentsGoogle Scholar
- Swanson M, Bartol N, Moorthy R (2010) Piloting supply change risk management practices for federal information systems. National Institute of Standards and Technology (NIST), U.S. Department of Commerce, p 1Google Scholar
- Tummala R, Schoenherr T (2011) Assessing and managing risks using the Supply Chain Risk Management Process (SCRMP). Supply Chain Manag 16(6):474–483CrossRefGoogle Scholar
- US Chamber of Commerce, International Affairs (2016) Preventing de globalization: an economic and security argument for free trade and investment in ICT. https://www.uschamber.com/sites/default/files/documents/files/preventing_deglobalization_1.pdf
Copyright information
© Springer Nature Switzerland AG 2019